We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30208

Vite bypasses server.fs.deny when using `?raw??`



Description

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

Reserved 2025-03-18 | Published 2025-03-24 | Updated 2025-03-24 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-284: Improper Access Control

Product status

< 4.5.10
affected

>= 5.0.0, < 5.4.15
affected

>= 6.0.0, < 6.0.12
affected

>= 6.1.0, < 6.1.2
affected

>= 6.2.0, < 6.2.3
affected

References

github.com/...s/vite/security/advisories/GHSA-x574-m823-4x7w

github.com/...ommit/315695e9d97cc6cfa7e6d9e0229fb50cdae3d9f4

github.com/...ommit/80381c38d6f068b12e6e928cd3c616bd1d64803c

github.com/...ommit/807d7f06d33ab49c48a2a3501da3eea1906c0d41

github.com/...ommit/92ca12dc79118bf66f2b32ff81ed09e0d0bd07ca

github.com/...ommit/f234b5744d8b74c95535a7b82cc88ed2144263c1

cve.org (CVE-2025-30208)

nvd.nist.gov (CVE-2025-30208)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30208

Support options

Helpdesk Chat, Email, Knowledgebase